Security Market Segment LS
Friday, 23 September 2016 08:26

Yahoo! confirms leak of 500m user details Featured


A massive data leak from Yahoo! of account details of about 500 million users took place two years ago, according to the company.

Yahoo! said in a statement that the credentials was stolen in late 2014 by what it claims is a state-sponsored actor.

While Yahoo! was aware that at least 200 million user details were being sold on the dark web in August, it informed Verizon, which agreed to buy Yahoo! in July, of the theft just two days ago, according to a published report.

A reporter from the website Motherboard was told by Yahoo! on 1 August that it was aware of claims that user details were being advertised for sale on the dark web. But it did not put out any public notice of this until 22 September.

Yahoo! said the stolen account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (most with bcrypt) and encrypted or unencrypted security questions and answers.

The company added that an ongoing investigation indicated that unprotected passwords, payment card data, or bank account information were not stolen.

It said payment card data and bank account information were not stored in the system found to be affected.

"Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo!'s network," it said.

Tim Bentley, managing director of cybersecurity company Proofpoint in Australia and New Zealand, said: "The overnight news that Yahoo! email accounts have been breached reinforces our research that email is the number one most critical risk vector for inbound threats as it provides a direct link between an attacker and victim.

"It's also a critical threat vector for outbound data loss and is the greatest threat to an organisation if employees access their personal email on workplace machines. Attackers can use these compromised accounts to break into some of the world's most sophisticated organisations."

Added Bentley: "If your personal email is compromised, and an attacker assumes your identity, all of your contacts are exposed to an immediate threat by allowing the attacker to reset all of your other account passwords. Email best practices advise you change your passwords frequently and to not use the same credentials across all of your accounts."


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments